3GPP TSG SA WG3 Security S3#25 S October 2002 Munich, Germany
|
|
|
- Edith Thornton
- 10 years ago
- Views:
Transcription
1 3GPP TSG SA WG3 Security S3#25 S October 2002 Munich, Germany Title: Response to: Source: To: Cc: Liaison on HTTP Security investigation within IMS LS S (S ) on Liaison on Security Issues with use of HTTP within IMS SA3 SA2 SA1, SA5 Contact Person: Name: Tao Haukka Company: Nokia Corporation Tel. Number: Address: Attachments: S , HTTP security 1. Overall Description: SA3 would like to thank to SA2 for communicating their Liaison statement on the usage of HTTP within release 6. As requested, SA3 have investigated a potential solution (S , attached) to provide security for HTTP data channel within IMS for service related purposes. It is however unclear to SA3 what services shall utilize HTTP and what functionalities to be achieved. SA3 also kindly remind that the architecture choices made by SA2 may have impact to the security solution, therefore the solution attached should be considered as one of the options but not as SA3 s approved one at current stage. 2. Actions: To SA2 group: SA3 is looking forward to SA2 s response to clarify the services utilizing HTTP and the functionalities to be achieved. 3. Date of next SA3 Meetings: SA3 # Nov Oxford, UK. SA3# Feb TBC
2 3GPP TSG SA WG3 Security S3#25 S October 2002 Munich, Germany 1 Source: Title: Document for: Nokia HTTP Security Discussion /Decision Agenda Item: 7.17 Abstract This paper is a study of HTTP security under request from SA2 WG. One solution very much based on IETF existing protocol is presented. It also combines 3GPP Digest AKA for authentication as advantage. 1. Introduction SA2 is currently working on a number of IMS related work items for release 6 including the stage 2 for the Presence Service. Proposals have been presented in SA2 suggesting the use of HTTP within IMS for various service-related purposes. It has also been identified within SA2 that there are possible Security and Charging issues currently with the use of HTTP as part of the IMS. Though they have not yet identified any particular use scenarios for HTTP however it is likely that such scenarios will be identified by SA2 within release 6. SA2 asked SA3 and SA5 to comment and investigate potential security and charging issues related to the use of HTTP within IMS for service related purposes (e.g. for UE control of service provisioning and manipulation of service related data, etc) [1]. This discussion paper is based on S2 s LS S , which requests SA3 s investigation on Security issues in use of HTTP with IMS. We have studied security implementations and one potential solution, where Authentication Proxy (AP), is introduced. It takes care of security on behalf of certain application servers e.g. Presence. As such the HTTP security function can be implemented with IMS system rather independently and efficiently. We have also compared potential security protocols for HTTP security, namely IPsec and TLS. 2. HTTP Security 2.1. User authentication in the home network By using the Authentication Proxy (AP) it is possible to authenticate UE on behalf of all Application services, based on AKA protocol. Only one HTTP security association is created between UE and Authentication Proxy. UE shall be able to initiate an HTTP session. In this case, user authentication is performed between UE and AP using AKA over HTTP Digest, so the user does not need to have any password-like in the original design of HTTP Digest. Authentication Vectors (AV) for HTTP connection can be fetched from the HSS to the Authentication Proxy via Diameter based interface similar to the Cx interface (hereafter written as Cx-like). Re-use of the IMS authentication scheme can simplify the implementation in UE and Application servers. Also the sequence number management of AKA protects against replay attack. Note that, before establishment of HTTP session, TLS connection must be done first according to IETF RFC2818 [2]. In an alternative case, IPSec ESP connection can be established. In the next clause the two alternatives are compared. For the sake of simplicity, TLS is assumed in the figure below.
3 Figure 1 illustrates the solution that provides security for HTTP based connection in case where UE is in Home Network. 2 Application Servers Authentication Proxy HTTP over TLS AVs for HTTP over Cx-like interface SIP HTTP Digest-AKA HSS UE P-CSCF I-CSCF S-CSCF AVs for SIP over Cx ISC(SIP/NDS) Figure 1. Security of HTTP connection for IMS data In this solution HTTP security is independent from the IMS security. The common parts between Application servers and IMS are the same Digest AKA mechanism and the same user name (IMPI). SIP is used between UE and IMS, and also through ISC interface. Cx and Cx-like interfaces are Diameter based and also protected over NDS/IP. This solution does not require registration of UE to the IMS before accessing to some Application Server, if this service requires HTTP transport only. This independence also allows operators to add Application service later on the top of existing IMS Transport security TLS (SSL also) was designed for applications directly on top of transport layer, such as HTTP, SMTP or FTP. Both the HTTP and TLS require reliability of data delivery, thus usually run on top of TCP stack. Now that TCP is mandated in IMS, the use of TLS seems to be a permitted solution for HTTP. Compared with IPsec, TLS obviously is optimized for HTTP data security. It resolves credentiality closely with application located in client and server. There have been various practices in the Internet, such as banking, e-purchasing, using TLS/SSL for HTTP as protocol. Standard has been established secure and mature in this aspect [4]. Comparatively, IPsec is sufficient to provide data security in hop level, but not session level Authentication Proxy The Authentication Proxy supports application protocol (HTTP) level authentication of user identity and also establishes integrity and confidentiality protected connection based on TLS between UE and AP. The mutual authentication between UE and AP is based on Digest AKA using IMPI as a user identifier. HTTP Digest AKA-procedure is a replica of the similar procedure specified by 3GPP and used in IMS for the authentication of UE over Digest AKA (AKA-procedure is executed during the SIP registration). Digest AKA is supported both by UE and S-CSCF. AP is actually an HTTP alike server, which terminates the TLS-connections and it has the ability to route traffic between the UE and the Application Servers. The security association may be maintained between sessions and it is renewed in each run of the AKA procedure.
4 3 The use of TLS between the UE and the Authentication Proxy to protect HTTP connection does not require additional standardisation work in IETF. UE is authenticated using HTTP Digest-AKA via the secure TLS connection. To make sure the contacted AP is the intended server, it is recommended to process server authentication by requesting server s certificate. When IMS service is located at the home network, the verification shall be easy, because usually the root certificate of the home CA is available in terminal. After a successful mutual authentication over TLS-protected 1 st hop UE can have access to several application servers over a single security association. AP may also establish TLS connections between AP and Application servers but this part is not further discussed in this contribution Interface between Authentication Proxy and HSS Existing 3GPP Cx application could be reused for the IMS based services. Although the Cx application contains more complicated commands, only the authentication commands are needed. Authentication Proxy should therefore, only use them and thereby according to the Cx application the HSS shall not initiate other commands, because there is no SIP registration state in the Diameter client node (e.g. S- CSCF). HSS does not see any distinction whether S-CSCF or AP requesting the authentication items. The current Cx specification mandates that the server name, i.e. S-CSCF name, is included into the Multimedia-Auth-Request (MAR). This is needed in IMS, e.g. in the initial registration, so as to route SIP messages to the S-CSCF. AP requesting authentication items does not need to include the server name. HSS can decide to maintain the existing IMS registration state, e.g. the name of the S-CSCF, and not overwrite the S-CSCF name with the new name. In Cx, the integrity key is mandatory and the confidentiality key optionally returned in the Multimedia- Auth-Answer (MAA) command. Application servers may not need these keys. This is the content we see in Cx-like interface Sequence number management By using a common system for sequence number management, IMS provides network authentication for SIP between UE and S-CSCF as well as for HTTP between UE and AP. The Authentication Center (AuC) functionality in HSS creates Authentication Vectors (AVs) using master secret key K of IMS, which is the key in ISIM for both SIP/IMS and HTTP security systems. Some of the generated AVs are used by SIP security system as is defined in the 3GPP TS [3] and some are used by HTTP security system. The Authentication Proxy asks one AV via interface from HSS/AuC for each HTTP-user authentication (between UE and AP). Stored in ISIM in UE there is only one common set of sequence numbers for SIP/IMS domain and HTTP/Application domain. This sequence number management method is operator-specific. However, the recommended method is to store an array of sequence numbers in the ISIM. In that case, some of the indices in the array can be reserved for Application domain usage. Fetching only one AV at a time guarantees that the disturbance caused by the second domain is minimised. Each AV should be used only once. The sequence number management method between IMS and Application domains in UE is similar to the one used in 3GPP TS [4] between Packet Switched (PS) and Circuit Switched (CS) access network domains. Also there, CS and PS domain run AKA procedures independently of each other while using similar AVs. Re-synchronisation of the sequence numbers is also done similarly as for PS and CS domains in the cases where synchronisation is needed.
5 3. Conclusion and proposal 4 This contribution establishes a separate data channel than SIP connection. It does not assume the access to IMS previously. The study has shown that it is possible to offer authentication and other security services to different application servers in the Application cloud with only one Authentication Proxy. Then less performance is consumed in UE, because there is no need to connect to each Application Server separately to establish several security associations. Also, there are similar benefits on the network side: all Application servers may share the same security associations. The advantages of this scheme are also the re-use of AKA and partial functionality of the Cx interface. Without Authentication Proxy sequence number management of SAs is much more complicated, separate authentications to every application server would cause extra delay and terminal burden; several connections to HSS decrease the system security. The use of TLS to protect HTTP traffic is seen as a better solution as the use of IPsec, although the latter was chosen in the case of IMS security. This preference follows the general trend in the IETF and Internet domain services. It is proposed to start the analysis based on knowledge investigated as baseline. And it is also proposed to query from SA2 for the deployment detail of HTTP feature and its security function required. 4. References [1] 3GPP Tdoc S Liaison on Security and Charging Issues with use of HTTP within IMS [2] IETF RFC 2818: HTTP over TLS [3] 3GPP TS Access security for IP-based services v5.3.0 [4] 3GPP TS Security Architecture v5.0.0
2. Archtiecture overview related to support for use of a reverse http proxy
3GPP TSG SA WG3#30 S3-030576 6-10 Okt 2003 Povoa de Varzim, Porugal Agenda Item: Source: Title: Document for: GBA Alcatel Comparison of different solutions for GBA and AP based AS: standard TLS versus
Security considerations for IMS access independence
3GPP TSG SA WG3 Security S3#20 S3-010468 16-19 October, 2001 Sydney, Australia Source: Title: Document for: Agenda Item: Telia / independence Information Security Security considerations for access independence
ETSI TS 133 203 V5.1.0 (2002-03)
TS 133 203 V5.1.0 (2002-03) Technical Specification Universal Mobile Telecommunications System (UMTS); 3G security; Access security for IP-based services (3GPP TS 33.203 version 5.1.0 Release 5) 1 TS 133
TSGS#27(05)0115. Technical Specification Group Services and System Aspects Meeting #27, 14-17 March 2005,Tokyo, Japan
Technical Specification Group Services and System Aspects Meeting #27, 14-17 March 2005,Tokyo, Japan TSGS#27(05)0115 Source: TSG SA WG2 Title: CR(s) to 23.981 Agenda item: 7.2.3 Document for: APPROVAL
ETSI TR 133 919 V6.1.0 (2004-12)
TR 133 919 V6.1.0 (2004-12) Technical Report Universal Mobile Telecommunications System (UMTS); Generic Authentication Architecture (GAA); System description (3GPP TR 33.919 version 6.1.0 Release 6) 1
3GPP TSG CN Plenary Meeting #16 5 th - 7 th June 2002. Marco Island, USA. 3GPP TSG-CN1 Meeting #24 Tdoc N1-021455 Budapest, Hungary, 13. 17.
3GPP TSG CN Plenary Meeting #16 5 th - 7 th June 2002. Marco Island, USA. NP-020155 Title: Liaison Statement on 3GPP Network Domain Name usage for IMS Source: CN1 Agenda item: 5.1 Document for: INFORMATION
A Call Conference Room Interception Attack and its Detection
A Call Conference Room Interception Attack and its Detection Nikos Vrakas 1, Dimitris Geneiatakis 2 and Costas Lambrinoudakis 1 1 Department of Digital Systems, University of Piraeus 150 Androutsou St,
3GPP TS 33.220 V6.13.0 (2007-06)
TS 33.220 V6.13.0 (2007-06) Technical Specification The present document has been developed within the 3 rd Generation Partnership Project ( TM ) and may be further elaborated for the purposes of. The
Implementing Conditional Conference Call Use Case over IMS and Non IMS Testbed an experimental results through comparison approach
Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 109 Implementing Conditional Conference Call Use Case over IMS and Non
How to secure an LTE-network: Just applying the 3GPP security standards and that's it?
How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro
End-to-End Quality-of-Service Support in Next Generation Networks with NSIS
End-to-End Quality-of-Service Support in Next Generation Networks with NSIS Roland Bless, Martin Röhricht Karlsruhe Institute of Technology, Germany Institute of Telematics, Department of Computer Science
Delivery of Voice and Text Messages over LTE
Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a
Conferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem
GPP X.S00-0 Version.0 Version Date: May 00 Conferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem Revision: 0 COPYRIGHT GPP and its Organizational Partners claim copyright in this document
Location in SIP/IP Core (LOCSIP)
in SIP/IP Core (LOCSIP) Conveyance with IMS: the OMA LOCSIP Service Enabler Mike Loushine / Don Lukacs Telcordia Applied Research 2009, Telcordia Technologies Inc. in SIP/IP Core (LOCSIP) Topics General
of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier
VoLTE 3GPP Roaming Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends VoLTE Roaming and ion Standard Technology In 3GPP Release 11, the VoLTE roaming and interconnection architecture
GAA/GBA: a new Architecture for single sign-on
GAA/GBA: a new Architecture for single sign-on 2nd ETSI Security Workshop: Future Security 16-17 January 2007 Sophia- Antipolis (France) SER MÁS LÍDERES Wednesday, 17th January 2007 [email protected]
Authentication and Security in IP based Multi Hop Networks
7TH WWRF MEETING IN EINDHOVEN, THE NETHERLANDS 3RD - 4TH DECEMBER 2002 1 Authentication and Security in IP based Multi Hop Networks Frank Fitzek, Andreas Köpsel, Patrick Seeling Abstract Network security
CHANGE REQUEST. 2 (GSM Phase 2) A (corresponds to a correction in an earlier release) R96 (Release 1996) B (addition of feature),
TSG-CN Meeting #25 Palm Springs, USA. 8 th to 10 th September 2004. Tdoc NP-040427 revision of Tdoc N1-041566 in NP-040380 TSG-CN1 Meeting #35 Sophia Antipolis, France, 16-20 August 2004 Tdoc N1-04xxxx
Design Document. Offline Charging Server (Offline CS ) Version 1.0. - i -
Design Document Offline Charging Server (Offline CS ) Version 1.0 - i - Document Scope Objective The information provided in this document specifies the design details of Operations of Offline Charging
A Proposed Model For QoS guarantee In IMSbased Video Conference services
International Journal of Intelligent Information Technology Application, 2009, 2(5):243-249 A Proposed Model For QoS guarantee In IMSbased Video Conference services Maryam Kiani Department of Electrical
A Scenario of Machine-to-Machine (M2M) Health Care Service
A Scenario of Machine-to-Machine (M2M) Health Care Service Jung-Ho Kim*, Ya-Ting Wei*, Jae-Oh Lee* * Dept. of Electrical, Electronics &, Korea University of Technology and Education, Korea {jungho32, weiyating,
3GPP TR 33.804 V11.1.0 (2012-06)
TR 33.804 V11.1.0 (2012-06) Technical Report 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Single Sign On (SSO) application security for Common IP Multimedia
Advanced SIP Series: SIP and 3GPP
Advanced SIP Series: SIP and 3GPP, Award Solutions, Inc Abstract The Session Initiation Protocol has been selected as the main signaling protocol of the Third Generation Partnership Projects IP Multimedia
ETSI TS 182 023 V2.1.1 (2009-01) Technical Specification
TS 182 023 V2.1.1 (2009-01) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Core and enterprise NGN interaction scenarios; Architecture
Architectural Overview of IP Multimedia Subsystem -IMS
Architectural Overview of IP Multimedia Subsystem -IMS Presented by: Masood Khosroshahy June 2006 B E G I N N I N G 1 Project supervisor: Prof. Elie Najm Simplified view of the layered architecture in
Load Balancing Support for Self-Organizing IMS Networks
Load Balancing Support for Self-Organizing IMS Networks Christian Makaya, Ashutosh Dutta, Subir Das, Dana Chee, F. Joe Lin Telcordia Technologies, Inc. Piscataway, NJ, USA Email: [email protected]
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
... Figure 2: Proposed Service Invocation Mechanism. AS Service invocation 2 SC invocation 2. Session/Call Control Function
Next Generation Network Service Architecture in the IP Multimedia Subsystem Anahita Gouya, Noël Crespi, Lina Oueslati, {anahita.gouya, noel.crespi, lina.oueslati}@int-evry.fr, Institut National des Télécommunications
XML Document Management Architecture
XML Document Management Architecture Candidate Version 2.0 02 Dec 2010 Open Mobile Alliance OMA-AD-XDM-V2_0-20101202-C OMA-AD-XDM-V2_0-20101202-C Page 2 (30) Use of this document is subject to all of the
ETSI TS 124 147 V6.8.0 (2008-04) Technical Specification
TS 124 147 V6.8.0 (2008-04) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Conferencing using the IP Multimedia (IM) Core
3GPP TS 24.623 V8.1.0 (2008-09)
TS 24.623 V8.1.0 (2008-09) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Extensible Markup Language (XML) Configuration Access Protocol
LTE and the Evolution to 4G Wireless
LTE and the Evolution to 4G Wireless Design and Measurement Challenges Bonus Material: Security in the LTE-SAE Network www.agilent.com/find/lte Introduction Security in the LTE-SAE Network This overview
Acme Packet Net-Net SIP Multimedia-Xpress
Acme Packet Net-Net SIP Overview Net-Net SIP (SMX) combines IP Multimedia Subsystem (IMS) session management with leading session border control (SBC) functions to reduce the complexity and cost of delivering
Overview of GSMA VoLTE Profile. minimum required functions [3]. 2. Background
GSMA Overview of GSMA Profile It was agreed in the GSMA in February 2010 that voice services over LTE () shall use the platform standardized by the 3GPP with a view to maximizing international interoperability.
Investigation of Interworked IMS Architecture In Terms Of Traffic Security
Master Thesis in Electrical Engineering Department Of Telecommunication Engineering Blekinge Institute of Technology Investigation of Interworked IMS Architecture In Terms Of Traffic Security By: Aftab
Secured Communications using Linphone & Flexisip
Secured Communications using Linphone & Flexisip Solution description Office: Le Trident Bat D 34, avenue de l Europe 38100 Grenoble France Tel. : +33 (0)9 52 63 65 05 Headquarters: 12, allée des Genêts
Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated
3GPP2 Workshop, Boston, MA Title: Source: Contact: Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated Jen M. Chen QUALCOMM Incorporated 858-658-2543
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
MED: Voice over IP systems
www.ptt.co.uk Online course specification MED: Voice over IP systems Target audience: This online course is designed for those who will be responsible for the design or maintenance of Voice over IP (VoIP)
Authentication, Authorization and Accounting (AAA) Protocols
Authentication, Authorization and Accounting (AAA) Protocols Agententechnologien in der Telekommunikation Sommersemester 2009 Babak Shafieian [email protected] 10.06.2009 Agententechnologien
Juha Heinänen [email protected]
From Voice over IP to Voice over Internet Juha Heinänen [email protected] From VoIP to VoINET VoIP replaced wires in PBX and PSTN backbones with IP preserves the traditional, centralized telephony service
COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments
Contents Foreword Preface Acknowledgments 1 Introduction 1 1.1 Motivation for Network Convergence 1 1.2 The Core Network 2 1.3 Legacy Service Requirements 4 1.4 New Service Requirements 5 1.5 Architectures
Mobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures
4th Workshop on Mobile Cloud Networking, June 19th, 2014, Lisbon, Portugal Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures Giuseppe Carella, Marius
Implementing LTE International Data Roaming
Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between
End-2-End QoS Provisioning in UMTS networks
End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1
Table of Content. Introduction Components Architectural Characteristics Concepts Protocols Service Examples Discussion. ToC
Danar Barzanji Marcel K Steffen Roger Trösch 22.06.2006 Communication Systems IMS www.packetizer.com Table of Content Introduction Components Architectural Characteristics Concepts Protocols Service Examples
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
How To Understand The Security Of An Ip Multimedia Subsystem (Ims)
254 JOURNAL OF NETWORKS, VOL. 4, NO. 4, JUNE 2009 Model-based Vulnerability Analysis of IMS Network Dong Wang College of Computer Beijing University of Posts and Telecommunications, Beijing, China Email:
Security and Authentication Concepts
Security and Authentication Concepts for UMTS/WLAN Convergence F. Fitzek M. Munari V. Pastesini S. Rossi L. Badia Dipartimento di Ingegneria, Università di Ferrara, via Saragat 1, 44100 Ferrara, Italy
ETSI TS 124 423 V8.4.0 (2012-01)
TS 124 423 V8.4.0 (2012-01) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; TISPAN; PSTN/ISDN simulation services;
Application Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
Voice Quality with VoLTE
Matthias Schulist Akos Kezdy Qualcomm Technologies, Inc. Voice Quality with VoLTE 20. ITG Tagung Mobilkommunikation 2015 Qualcomm Engineering Services Support of Network Operators Strong R&D Base End-to-end
Experiences on the Establishment and Provisioning of NGN/IMS Testbeds - The FOKUS Open IMS Playground and the Related Open Source IMS Core
Experiences on the Establishment and Provisioning of NGN/IMS Testbeds - The FOKUS Open IMS Playground and the Related Open Source IMS Core T. Magedanz, P. Weik, D. Vingarzan, F. Carvalho de Gouveia, S.
Presence SIMPLE Architecture
Presence SIMPLE Architecture Approved Version 1.1 27 Jun 2008 Open Mobile Alliance OMA-AD-Presence_SIMPLE-V1_1-20080627-A OMA-AD-Presence_SIMPLE-V1_1-20080627-A Page 2 (21) Use of this document is subject
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
ARIB TR-T12-33.918 V7.0.0
ARIB TR-T12-33.918 V7.0.0 Generic Authentication Architecture (GAA); Early implementation of Hypertext Transfer Protocol over Transport Layer Security (HTTPS) connection between a Universal Integrated
Kommunikationsdienste im Internet Möglichkeiten und Risiken
Die Zukunft der Kommunikationsdienste im Internet Möglichkeiten und Risiken Erwin P. Rathgeb Technik der Rechnernetze, Universität Duisburg-Essen Jochen Kögel, Marc Barisch IKR, Universität Stuttgart Steffen
WHAT S BEHIND YOUR SMARTPHONE ICONS? A brief tour of behind-the-scenes signaling for multimedia services
WHAT S BEHIND YOUR SMARTPHONE ICONS? A brief tour of behind-the-scenes signaling for multimedia services Harry G. Perros Computer Science Department NC State University, Raleigh 27695 USA Email: [email protected]
Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明
Spirent Abacus SIP over TLS Test 编 号 版 本 修 改 时 间 说 明 1 1. TLS Interview (Transport Layer Security Protocol) (1) TLS Feature Introduction: 1. TLS is a successor of Secure Sockets Layer (SSL), a cryptographic
Advanced SIP Series: SIP and 3GPP Operations
Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.
II. Service deployment
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofia 2009 Integration of Services Implemented on Different Service Platforms Evelina Pencheva, Ivaylo Atanasov Technical
PacketCable 2.0. HSS Technical Report PKT-TR-HSS-V01-060914 RELEASED. Notice
PacketCable 2.0 HSS Technical Report RELEASED Notice This PacketCable technical report is a cooperative effort undertaken at the direction of Cable Television Laboratories, Inc. (CableLabs ) for the benefit
Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT http://www.efort.com
1 Introduction Voice over IP over LTE (VoLTE) Impacts on LTE access EFORT http://www.efort.com IMS (IP Multimedia Subsystems) has been around for some time, and many infrastructure vendors have invested
IP-based Mobility Management for a Distributed Radio Access Network Architecture. [email protected]
IP-based Mobility Management for a Distributed Radio Access Network Architecture [email protected] Outline - Definition IP-based Mobility Management for a Distributed RAN Architecture Page 2 Siemens
Migration of Enterprise VoIP/SIP Solutions towards IMS
1 Migration of Enterprise VoIP/SIP Solutions towards IMS Ram Kumar 1, Frank Reichert 1, Andreas Häber 1, Anders Aasgard 2, Lian Wu 2 Abstract Voice-over-IP (VoIP) solutions are now widely spread and accepted
RadSec RADIUS improved. Stig Venaas [email protected]
RadSec RADIUS improved Stig Venaas [email protected] Overview RADIUS overview RadSec overview What is wrong with RADIUS RadSec benefits Radsec implementations, deployment and standardisation RADIUS overview
SIP Based Architecture for Integration of 1xRTT Femtocells
SIP Based Architecture for Integration of 1xRTT Femtocells 2007 Tatara Systems Tatara Systems grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text or other copyrightable
IMS Release 10 Tutorial
IMS Release 10 Tutorial Silvia Scalisi University of Trento 1 Introduction The IP Multimedia Subsystem (IMS) is a network architecture that delivers services based upon the Internet protocols to mobile
LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks
LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks 1 Nokia Siemens Networks New evolved Networks - new security needs Walled Garden Transport & Protocols
IMS Interconnect: Peering, Roaming and Security Part One
T E C H N O L O G Y W H I T E P A P E R IMS Interconnect: Peering, Roaming and Security Part One IMS interconnection promises to enable greater reach and richer offerings for the providers that establish
Packet Switched Voice (over IP) and Video Telephony Services End-to-end System Design Technical Report
GPP X.R00-0 Version:.0 Date: November 00 Packet Switched Voice (over ) and Video Telephony Services End-to-end System Design Technical Report COPYRIGHT GPP and its Organizational Partners claim copyright
Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks
Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Mehdi Mani Wireless Networks and Multimedia Service Department GET-INT Evry, France [email protected] Noel Crespi Wireless
Research on Initial Filter Criteria of IP Multimedia Subsystem
Research on Initial Filter Criteria of IP Multimedia Subsystem Yafang WANG e-mail: [email protected] Xiaozhe ZHENG e-mail: [email protected] Leilei KANG e-mail: [email protected] Bingyang CHENG
7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
Lecture 4b AAA protocols (Authentication Authorization Accounting)
Lecture 4b AAA protocols (Authentication Authorization Accounting) Network security (19265400 / 201000086) Lecturers: Aiko Pras Pieter-Tjerk de Boer Anna Sperotto Ramin Sadre Georgios Karagiannis Lecture
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice
Communication Services in the Cloud: Challenges and Solutions Oracle Communications Session Monitor
Communication Services in the Cloud: Challenges and Solutions Oracle Communications Session Monitor Hendrik Scholz Product Manager, Strategy Communications Global Business Unit October 2014 Safe Harbor
ETSI TS 187 003 V1.7.1 (2008-02) Technical Specification
TS 187 003 V1.7.1 (2008-02) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); NGN Security; Security Architecture 2 TS 187 003 V1.7.1
All-IP Network Emergency Call Support
GPP S.R0-0 Version.0 Version Date: October 00 All-IP Network Emergency Call Support Stage Requirements COPYRIGHT GPP and its Organizational Partners claim copyright in this document and individual Organizational
Oracle Communications WebRTC Session Controller: Basic Admin. Student Guide
Oracle Communications WebRTC Session Controller: Basic Admin Student Guide Edition 1.0 April 2015 Copyright 2015, Oracle and/or its affiliates. All rights reserved. Disclaimer This document contains proprietary
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
ETSI TS 182 025 V3.3.1 (2011-03) Technical Specification
TS 182 025 V3.3.1 (2011-03) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Business trunking; Architecture and functional description
SIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
ETSI TS 132 454 V10.0.0 (2011-04) Technical Specification
TS 132 454 V10.0.0 (2011-04) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Telecommunication management; Key Performance Indicators (KPI) for the IP Multimedia Subsystem
Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to this document, please check http://kuix.
Spam Salt aka Message Salt An invention against email abuse (Spam), introducing an email sender authentication mechanism. Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to
Performance Estimation of a SIP based Push-to-Talk Service for 3G Networks
Performance Estimation of a SIP based Push-to-Talk Service for 3G Networks Eoin O Regan and Dirk Pesch Adaptive Wireless Systems Group Cork Institute of Technology Ireland Abstract Push-To-Talk (PTT) is
LTE service area. 3G service area. EPS : Evolved Packet System. Currently Planning & Coordination Office 1 C *
VoLTE esrvcc VSRVCC Inter-domain Handover Technologies in LTE for Voice (VoLTE) and TV Phone A data communication service called Xi (Crossy) has started in LTE. In the future, voice and TV phone services
ETSI TS 131 103 V10.1.0 (2011-04) Technical Specification
TS 131 103 V10.1.0 (2011-04) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Characteristics of the IP Multimedia
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
The FOKUS Open SIP AS - A Service Platform for NGN
The FOKUS Open SIP AS - A Service Platform for NGN Elmar Fasel, Karsten Knuettel, Thomas Magedanz {fasel knuettel magedanz}@fokus.fraunhofer.de TU Berlin, Lehrstuhl AV http://www.av.tu-berlin.de/ Fraunhofer
Securing the Interconnect Signaling Network Security
Securing the Interconnect Signaling Network Security Travis Russell Director, Cyber Security, Service Provider Networks Oracle Communications August, 2015 Current security landscape Much attention has
